IT eBooks

IT eBooks
Download, Read, Use

Network eBooks

Java APIs, Extensions and Libraries, 2nd Edition Java APIs, Extensions and Libraries, 2nd Edition

This book completes the Apress Java learning journey and is a comprehensive approach to learning Java APIs, extensions, and modules such as Java EE integration, mobile Java modules, JavaFX, and JDBC. In this book, you'll learn how to build user interfaces with Swing and JavaFX as well as how to write network programs with the new Java 9 and much more. Java APIs, Extensions and Libraries is for Java programmers who are familiar with the fundamentals of the Java language and Java programming, who are now ready to call upon the power of extended Java functionality available from the huge array of Java APIs, extensions, and libraries. After reading and learning from this book you'll be ready to become a professional Java programmer. Extend your Java skills beyond the fundamental object-oriented concepts and core language features; Apply Java Swing for building Java front ends; Get started with Java network programming; Connect to databases and access data from Java prog ...
Learn Cisco Network Administration in a Month of Lunches Learn Cisco Network Administration in a Month of Lunches

Cisco's ultrareliable routers and switches are the backbone of millions of networks, but "set and forget" is not an acceptable attitude. Fortunately, you don't have to be an old-time administrator to set up and maintain a Cisco-based network. With a handful of techniques, a little practice, and this book, you can keep your system in top shape. Learn Cisco Network Administration in a Month of Lunches is designed for occasional and full-time network administrators using Cisco hardware. In 22 bite-sized lessons, you'll learn practical techniques for setting up a Cisco network and making sure that it never fails. Real-world labs start with configuring your first switch and guide you through essential commands, protocols, dynamic routing tricks, and more. ...
Zero Trust Networks Zero Trust Networks

Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they're internet-facing, and considers the entire network to be compromised and hostile. Authors Evan Gilman and Doug Barth show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. You'll learn the architecture of a zero trust network including how to build one using currently available technology. Understand how the zero trust model embeds security within the system's operation, rather than layering it on top; Examine the fundamental concepts at play in a zero trust network including network a ...
Network Security Through Data Analysis, 2nd Edition Network Security Through Data Analysis, 2nd Edition

Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. Use sensors to collect network service, host, and active domain data; Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect; Detect unusual phenomena through explorator ...
Attacking Network Protocols Attacking Network Protocols

Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world's leading bug ­hunters. This comprehensive guide looks at networking from an attacker's perspective to help you discover, exploit, and ultimately ­protect vulnerabilities. You'll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you'll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to: Capture, manipulate, and replay packets; Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol; Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service; Use capture and analysis tools like ­Wireshar ...
Practical Packet Analysis, 3rd Edition Practical Packet Analysis, 3rd Edition

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network? Updated to cover Wireshark 2.x, the third edition of Practical Packet Analysis will teach you to make sense of your packet captures so that you can better troubleshoot network problems. You'll find added coverage of IPv6 and SMTP, a new chapter on the powerful command line packet analyzers tcpdump and TShark, and an appendix on how to read and reference packet values using a packet map. Practical Packet Analysis will show you how to: Monitor your network in real time and tap live network communications; Build customized capture and display filters; Use packet analysis to troubleshoot and resolve common network problems, like loss of connectivity, DNS issues, and slow speeds; Explore modern exploits and malware at the packet level; Extract file ...
Computer Networking Problems and Solutions Computer Networking Problems and Solutions

Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. Its problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must overcome, considering common solutions, and showing how those solutions have been implemented in new and mature protocols. Part I considers data transport (the data plane). Part II covers protocols used to discover and use topology and reachability information (the control plane). Part III considers several common network designs and architectures, including data center fabrics, MPLS cores, and modern Software-Defined Wide Area Networks (SD-WAN). Principles that underlie technologies such as Software Defined Networks (SDNs) are considered throughout, as solutions to problems faced by all networking technologies. This guide is ideal for b ...
Exam Ref 70-741 Networking with Windows Server 2016 Exam Ref 70-741 Networking with Windows Server 2016

Microsoft Exam 70-741 is for IT Pros interested in enhancing their skills for the latest version of Windows Server. This exam validates skills and knowledge for configuring advanced tasks required to deploy, manage, and maintain a Windows Server 2016 infrastructure, such as fault tolerance, certificate services, and identity federation. Passing this exam along with two other exams is required for MCSA and MCSE certifications. The Exam Ref is the official study guide for Microsoft certification exam 70-741. Featuring concise, objective-by-objective reviews and strategic case scenarios and Thought Experiments, exam candidates get professional-level preparation for the exam. The Exam Ref helps candidates maximize their performance on the exam and sharpen their job-role skills. It organizes material by the exam's objective domains Focus is on the skills measured on the exam: Implement Domain Name System (DNS); Implement DHCP; Implement IP Address Management (IPAM); Implement netwo ...
Raspberry Pi Networking Cookbook, 2nd Edition Raspberry Pi Networking Cookbook, 2nd Edition

With increasing interest in Maker Projects and the Internet of Things (IoT), students, scientists, and hobbyists are using the Raspberry Pi as a reliable, inexpensive platform to connect local devices to Internet services. This book begins with recipes that are essential to installing the Raspberry Pi and configuring it for network access. Then it continues with recipes on installing common networking services such as firewalls and file sharing. The final chapters include recipes for network monitoring, streaming data from the Raspberry Pi to IoT services, and using clusters of Raspberry Pis to store and analyze large volumes of data. ...
Neural Network Programming with Java Neural Network Programming with Java

Vast quantities of data are produced every second. In this context, neural networks become a powerful technique to extract useful knowledge from large amounts of raw, seemingly unrelated data. One of the most preferred languages for neural network programming is Java as it is easier to write code using it, and most of the most popular neural network packages around already exist for Java. This makes it a versatile programming language for neural networks. This book gives you a complete walkthrough of the process of developing basic to advanced practical examples based on neural networks with Java. You will first learn the basics of neural networks and their process of learning. We then focus on what Perceptrons are and their features. Next, you will implement self-organizing maps using the concepts you've learned. Furthermore, you will learn about some of the applications that are presented in this book such as weather forecasting, disease diagnosis, customer profil ...
Boost.Asio C++ Network Programming Cookbook Boost.Asio C++ Network Programming Cookbook

Starting with recipes demonstrating the execution of basic Boost.Asio operations, the book goes on to provide ready-to-use implementations of client and server applications from simple synchronous ones to powerful multithreaded scalable solutions. Finally, you are presented with advanced topics such as implementing a chat application, implementing an HTTP client, and adding SSL support. All the samples presented in the book are ready to be used in real projects just out of the box. As well as excellent practical examples, the book also includes extended supportive theoretical material on distributed application design and construction. ...
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2018